TRENDS is authorized to promote and deliver F5 courses in partnership with Red Education. F5 logo is a registered trademark of F5 Networks, Inc. in the US and in certain other countries. All rights reserved.

Configuring BIG-IP Access Policy Manager (APM) v14.1

Schedule

Start End Duration Location Details

Course Details

F5 CONFIGURING BIG-IP ACCESS POLICY MANAGER (APM) V14.1

Course Code: F5-BIG-IP-APM

Duration: 3 Days

Prerequisite:

Students should understand: Basic HTTP and HTML concepts Basic security concepts Common network terminology Web application terminology In addition, students should be proficient in: Basic PC operation and application skills, including operating a keyboard, mouse, Linux and Windows OS Basic Web browser operation (Internet Explorer and Mozilla Firefox are used in class)

Course Description:

This three-day course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager as it is commonly deployed in both application delivery network and remote access settings. The course introduces students to BIG-IP Access Policy Manager, its configuration objects, how it commonly deployed, and how typical administrative and operational activities are performed. The course includes lecture, hands-on labs, interactive demonstrations, and discussions.

Intended Audience:

This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP APM System.

Course Outline:

Module 1: APM Traffic Processing and APM Configuration Wizards

Module 2: APM Access Policies, Access Profiles

Module 3: Visual Policy Editor, Branches and Endings

Module 4: APM Portal Access and Rewrite Profiles

Module 5: Single Sign-On and Credential Caching

Module 6: APM Network Access and BIG-IP Edge Client

Module 7: Layer 4 and Layer 7 Access Control Lists

Module 8: APM Application Access and Webtop Types

Module 9: Remote Desktop, Optimized Tunnels and Webtop Links

Module 10: LTM Concepts including Virtual Servers, Pools, Monitors and SNAT’ing

Module 11: APM + LTM Use Case for Web Applications

Module 12: Visual Policy Editor Macros

Module 13: AAA Servers and Authentication and Authorization with Active Directory and RADIUS

Module 14: Endpoint Security with Windows Process Checking, Protected Workspace and Firewalls

Module 15: iRules, Customization and SAML